| package vc |
| |
| import ( |
| "bytes" |
| "crypto/ecdsa" |
| "errors" |
| "fmt" |
| "io" |
| "math/big" |
| |
| "veyron/runtimes/google/ipc/stream/crypto" |
| "veyron/runtimes/google/lib/iobuf" |
| |
| "veyron2/ipc/version" |
| "veyron2/security" |
| "veyron2/vom" |
| ) |
| |
| const ( |
| clientChannelEnd = "client" |
| serverChannelEnd = "server" |
| ) |
| |
| var ( |
| authServerContextTag = []byte("VCauthS\x00") |
| authClientContextTag = []byte("VCauthC\x00") |
| ) |
| |
| // authenticateAsServer executes the authentication protocol at the server and |
| // returns the identity of the client and server. |
| func authenticateAsServer(conn io.ReadWriteCloser, localID LocalID, crypter crypto.Crypter, v version.IPCVersion) (clientID, serverID security.PublicID, err error) { |
| // The authentication protocol has the server doing the final read, so |
| // it is the one that closes the connection. |
| defer conn.Close() |
| if serverID, err = localID.AsServer(); err != nil { |
| return |
| } |
| if err = writeIdentity(conn, serverChannelEnd, authServerContextTag, crypter, localID, serverID, v); err != nil { |
| return |
| } |
| clientID, err = readIdentity(conn, clientChannelEnd, authClientContextTag, crypter, v) |
| return |
| } |
| |
| // authenticateAsClient executes the authentication protocol at the client and |
| // returns the identity of the server. |
| // |
| // If serverName is non-nil, the authentication protocol will be considered |
| // successfull iff the server identity matches the provided regular expression. |
| func authenticateAsClient(conn io.ReadWriteCloser, localID LocalID, crypter crypto.Crypter, v version.IPCVersion) (serverID, clientID security.PublicID, err error) { |
| defer conn.Close() |
| if serverID, err = readIdentity(conn, serverChannelEnd, authServerContextTag, crypter, v); err != nil { |
| return |
| } |
| // TODO(ashankar,ataly): Have the ability to avoid talking to a server we do not want to. |
| // Will require calling Authorize on the server id? |
| if clientID, err = localID.AsClient(serverID); err != nil { |
| return |
| } |
| err = writeIdentity(conn, clientChannelEnd, authClientContextTag, crypter, localID, clientID, v) |
| return |
| } |
| |
| // identityMessage encapsulates information sent across the wire by a principal |
| // to introduce itself. |
| // |
| // Each field in the message is encrypted by the sender. |
| type identityMessage struct { |
| ChannelID []byte |
| ID []byte // VOM-encoded |
| SignR []byte |
| SignS []byte |
| Signature []byte // VOM-encoded |
| } |
| |
| var ( |
| errSameChannelPublicKey = errors.New("same public keys for both ends of the channel") |
| errChannelIDMismatch = errors.New("channel id does not match expectation") |
| errInvalidIdentityInMessage = errors.New("invalid identity in authentication message") |
| errInvalidSignatureInMessage = errors.New("channel id signature does not match in authentication message") |
| errSingleCertificateRequired = errors.New("exactly one X.509 certificate chain with exactly one certificate is required") |
| ) |
| |
| func writeIdentity(w io.Writer, chEnd string, contextTag []byte, crypter crypto.Crypter, id LocalID, pub security.PublicID, v version.IPCVersion) error { |
| // TODO(ashankar): Remove references to protocol V1 and V2 before release |
| if v == version.IPCVersion1 || v == version.IPCVersion2 { |
| // Compute channel id - encrypted chEnd string |
| chid, err := crypter.Encrypt(iobuf.NewSlice([]byte(chEnd))) |
| if err != nil { |
| return err |
| } |
| defer chid.Release() |
| |
| // VOM-encode and encrypt the (public) identity. |
| var buf bytes.Buffer |
| if err := vom.NewEncoder(&buf).Encode(pub); err != nil { |
| return err |
| } |
| eid, err := crypter.Encrypt(iobuf.NewSlice(buf.Bytes())) |
| if err != nil { |
| return err |
| } |
| defer eid.Release() |
| |
| // Sign the channel ID |
| signature, err := id.Sign(chid.Contents) |
| if err != nil { |
| return err |
| } |
| msg := identityMessage{ |
| ID: eid.Contents, |
| ChannelID: chid.Contents, |
| } |
| if v == version.IPCVersion1 { |
| er, err := crypter.Encrypt(iobuf.NewSlice(signature.R)) |
| if err != nil { |
| return err |
| } |
| defer er.Release() |
| es, err := crypter.Encrypt(iobuf.NewSlice(signature.S)) |
| if err != nil { |
| return err |
| } |
| defer es.Release() |
| msg.SignR, msg.SignS = er.Contents, es.Contents |
| } else { // v == version.IPCVersion2 |
| buf = bytes.Buffer{} |
| if err := vom.NewEncoder(&buf).Encode(signature); err != nil { |
| return err |
| } |
| esig, err := crypter.Encrypt(iobuf.NewSlice(buf.Bytes())) |
| if err != nil { |
| return err |
| } |
| defer esig.Release() |
| msg.Signature = esig.Contents |
| } |
| // Write the message out. |
| return vom.NewEncoder(w).Encode(msg) |
| } |
| // v == version.IPCVersion3 |
| signature, err := id.Sign(append(contextTag, crypter.ChannelBinding()...)) |
| if err != nil { |
| return err |
| } |
| var buf bytes.Buffer |
| ve := vom.NewEncoder(&buf) |
| if err := ve.Encode(pub); err != nil { |
| return err |
| } |
| if err := ve.Encode(signature); err != nil { |
| return err |
| } |
| msg, err := crypter.Encrypt(iobuf.NewSlice(buf.Bytes())) |
| if err != nil { |
| return err |
| } |
| defer msg.Release() |
| return vom.NewEncoder(w).Encode(msg.Contents) |
| } |
| |
| func readIdentity(reader io.Reader, expectedChEnd string, contextTag []byte, crypter crypto.Crypter, v version.IPCVersion) (security.PublicID, error) { |
| if v == version.IPCVersion1 || v == version.IPCVersion2 { |
| // Read the message. |
| var msg identityMessage |
| if err := vom.NewDecoder(reader).Decode(&msg); err != nil { |
| return nil, fmt.Errorf("failed to decode identityMessage: %v", err) |
| } |
| |
| // Decrypt and authenticate the channel id |
| chEnd, err := crypter.Decrypt(iobuf.NewSlice(msg.ChannelID)) |
| if err != nil { |
| return nil, fmt.Errorf("failed to decrypt ChannelID: %v", err) |
| } |
| defer chEnd.Release() |
| if bytes.Compare([]byte(expectedChEnd), chEnd.Contents) != 0 { |
| return nil, errChannelIDMismatch |
| } |
| |
| // Decrypt and VOM-decode the identity |
| idbytes, err := crypter.Decrypt(iobuf.NewSlice(msg.ID)) |
| if err != nil { |
| return nil, fmt.Errorf("failed to decrypt security.PublicID: %v", err) |
| } |
| defer idbytes.Release() |
| var id security.PublicID |
| if err := vom.NewDecoder(bytes.NewBuffer(idbytes.Contents)).Decode(&id); err != nil { |
| return nil, fmt.Errorf("failed to decode security.PublicID: %v", err) |
| } |
| if id == nil || id.PublicKey() == nil { |
| return nil, errInvalidIdentityInMessage |
| } |
| |
| // Decrypt the signature |
| if v == version.IPCVersion1 { |
| r, err := crypter.Decrypt(iobuf.NewSlice(msg.SignR)) |
| if err != nil { |
| return nil, fmt.Errorf("failed to decrypt SignR: %v", err) |
| } |
| defer r.Release() |
| s, err := crypter.Decrypt(iobuf.NewSlice(msg.SignS)) |
| if err != nil { |
| return nil, fmt.Errorf("failed to decrypt SignS: %v", err) |
| } |
| defer s.Release() |
| if !ecdsa.Verify(id.PublicKey(), msg.ChannelID, bigInt(r), bigInt(s)) { |
| return nil, errInvalidSignatureInMessage |
| } |
| } else { |
| sigbytes, err := crypter.Decrypt(iobuf.NewSlice(msg.Signature)) |
| if err != nil { |
| return nil, fmt.Errorf("failed to decrypt Signature: %v", err) |
| } |
| defer sigbytes.Release() |
| var sig security.Signature |
| if err = vom.NewDecoder(bytes.NewBuffer(sigbytes.Contents)).Decode(&sig); err != nil { |
| return nil, fmt.Errorf("failed to decode security.Signature: %v", err) |
| } |
| // Validate the signature |
| if !sig.Verify(id.PublicKey(), msg.ChannelID) { |
| return nil, errInvalidSignatureInMessage |
| } |
| } |
| return id, nil |
| } |
| // v == version.IPCVersion3 |
| var encryptedHandshake []byte |
| if err := vom.NewDecoder(reader).Decode(&encryptedHandshake); err != nil { |
| return nil, fmt.Errorf("failed to read handshake: %v", err) |
| } |
| handshake, err := crypter.Decrypt(iobuf.NewSlice(encryptedHandshake)) |
| if err != nil { |
| return nil, fmt.Errorf("failed to decrypt handshake: %v", err) |
| } |
| defer handshake.Release() |
| vd := vom.NewDecoder(bytes.NewBuffer(handshake.Contents)) |
| var id security.PublicID |
| if err := vd.Decode(&id); err != nil { |
| return nil, fmt.Errorf("failed to decode security.PublicID: %v", err) |
| } |
| var signature security.Signature |
| if err := vd.Decode(&signature); err != nil { |
| return nil, fmt.Errorf("failed to decode security.Signature: %v", err) |
| } |
| if !signature.Verify(id.PublicKey(), append(contextTag, crypter.ChannelBinding()...)) { |
| return nil, errInvalidSignatureInMessage |
| } |
| return id, nil |
| } |
| |
| func bigInt(slice *iobuf.Slice) *big.Int { return new(big.Int).SetBytes(slice.Contents) } |